Record summary
A quick snapshot of what this page covers.
ATT&CK object
The broader cybersecurity technique connected to these AI records.
Adversaries may search freely available technical databases for information about victims that can be used during targeting. Information about victims may be available in online databases and repositories, such as registrations of domains/certificates as well as public collections of network data/artifacts gathered from traffic and/or scans.(Citation: WHOIS)(Citation: DNS Dumpster)(Citation: Circl Passive DNS)(Citation: Medium SSL Cert)(Citation: SSLShopper Lookup)(Citation: DigitalShadows CDN)(Citation: Shodan)
Adversaries may search in different open databases depending on what information they seek to gather. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: Phishing for Information or Search Open Websites/Domains), establishing operational resources (ex: Acquire Infrastructure or Compromise Infrastructure), and/or initial access (ex: External Remote Services or Trusted Relationship).
- ATT&CK ID
- T1596
- STIX ID
- attack-pattern--55fc4df0-b42c-479a-b860-7a6761bcaad0
- Name
- Search Open Technical Databases
- Connected AI records
- 1
Connected AI records
AI security records connected to this cybersecurity technique.
AML.T0000 - Search Open Technical Databases
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.